Dan,

Just to agree with what Paul said, we don't run with auditd in our ubuntu
zones. We do have rsyslogd running but I haven't tried to do much with
configuring it.

Jerry


On Sun, Feb 1, 2015 at 2:51 PM, Dan McDonald via smartos-discuss <
[email protected]> wrote:

> Good news:  I got it to zsched, via a Frankenstein-like
> lx_boot_zone_redhat (attached).
>
> Bad news:  I'm hanging on two processes:  rsyslogd and auditd:
>
> [root@00-0c-29-77-9d-fe ~]# ptree 19446
> 19376 zsched
>   19446 /sbin/init
>     19569 /bin/bash /etc/rc.d/rc 3
>       19744 /bin/bash /etc/rc3.d/S11auditd start
>         19748 /bin/bash -c ulimit -S -c 0 >/dev/null 2>&1 ; auditd
>           19750 auditd
>     19570 /bin/bash /etc/rc.d/rc 3
>       19763 /bin/bash /etc/rc3.d/S12rsyslog start
>         19765 /bin/bash -c ulimit -S -c 0 >/dev/null 2>&1 ; /sbin/rsyslogd
> -i /
>           19766 /sbin/rsyslogd -i /var/run/syslogd.pid -c 5
>             19767 <defunct>
> [root@00-0c-29-77-9d-fe ~]#
>
>
> It's generating corefiles alright!
>
> [root@00-0c-29-77-9d-fe /zones/2394dc9a-5493-4317-9304-ce91cc6a3b83]# ls
> cores/
> core.audispd.20389  core.init.20418     core.init.20423     core.init.20428
> core.audispd.20396  core.init.20419     core.init.20424     core.init.20429
> core.auditd.20387   core.init.20420     core.init.20425     core.init.20430
> core.auditd.20394   core.init.20421     core.init.20426
> core.init.20417     core.init.20422     core.init.20427
> [root@00-0c-29-77-9d-fe /zones/2394dc9a-5493-4317-9304-ce91cc6a3b83]#
>
> The second time I created a VM, it only stopped at auditd.  auditd seems
> to be a problem.  Of course, the script (attached) still doesn't seem to
> want to change the selinux configuration from this:
>
> # This file controls the state of SELinux on the system.
> # SELINUX= can take one of these three values:
> #     enforcing - SELinux security policy is enforced.
> #     permissive - SELinux prints warnings instead of enforcing.
> #     disabled - No SELinux policy is loaded.
> SELINUX=permissive
> # SELINUXTYPE= can take one of these two values:
> #     targeted - Targeted processes are protected,
> #     mls - Multi Level Security protection.
> SELINUXTYPE=targeted
>
>
> to this:
>
>
> # This file controls the state of SELinux on the system.
> # SELINUX= can take one of these three values:
> #     enforcing - SELinux security policy is enforced.
> #     permissive - SELinux prints warnings instead of enforcing.
> #     disabled - No SELinux policy is loaded.
> SELINUX=disabled
> # SELINUXTYPE= can take one of these two values:
> #     targeted - Targeted processes are protected,
> #     mls - Multi Level Security protection.
> SELINUXTYPE=targeted
>
>
> Thanks!
> Dan
>
>
>
> -------------------------------------------
> smartos-discuss
> Archives: https://www.listbox.com/member/archive/184463/=now
> RSS Feed:
> https://www.listbox.com/member/archive/rss/184463/21516906-2011406d
> Modify Your Subscription:
> https://www.listbox.com/member/?&;
> Powered by Listbox: http://www.listbox.com
>



-------------------------------------------
smartos-discuss
Archives: https://www.listbox.com/member/archive/184463/=now
RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb
Powered by Listbox: http://www.listbox.com

Reply via email to